The SHA-512 hash function accepts any message from a single bit to $2^{128}$ bits. Because the function takes into account the message length, I can't just represent every message as a $2^{128}$-bit ...

I have managed to lose 5 words of my 24 word Ledger Nano S recovery phrase. I have words 1-19 but I am missing words 20-24.
I have significant holdings on the wallet so would very much like to recover ...

For a sha512 hash of a secp256k1 public key, how many other public keys could generate that hash? I would assume zero since the key size is equal to the hash length (secp256k1 public keys are 64 bytes,...

Setting aside questions of if BCrypt should even be used in this way, I was just wondering which one would be more secure hypothetically.
If you want to know why I don't just use random salts as per ...

It seems like SHA-512 truncated to 256 bits is usable as a MAC [1]. The advantage is that it's ~50% faster than HMAC-SHA-256 on 64-bit CPUs and ~50% faster than HMAC-SHA-512 on short inputs. (My use ...

I was recently solving a CTF problem and it involved a shadow and passwd file. I got to know the username easily but I am unable to find the password since it is SHA512 hashed. My doubt is that when I ...

Biggest flaw in VeraCrypt(or other Encryption programs) is Hash Algorithm.
VeraCrypt hashes (SHA,Whirlpool,Streebog) it is the only point where can break an encrypted disk. Because break algorithm (...

NIST specified SHA-2 hash functions with truncated output. Those hashes use different initialization values than SHA-256 or SHA-512. SHA-224 is based on SHA-256. SHA-384, SHA-512/224 and SHA-512/256 ...

Let us assume that we have a string $w$ such that it belongs the set $C$, where every member of $C$ is not null, and contains every string of characters that can be permuted (numbers, letters etc.). ...

I'm curious, how can for example SHA-256 be unique if there are only a limited number of them?!
For clarification:
how many MD5 hashes are there?
$16^{32}$ MD5 hashes can be produced.
$16^{64}$ SHA-...

I'm working on a web application where passwords must be hashed on the client before it can be send to the server. This is because the user's raw password is used for cryptography purposes and can't ...

I would like to encrypt a file by XORing the source message with a prng of my own.
The prng is streaming a flow of sha512 hashes. Each hash is produced from the previous hash plus constant string plus ...

I've created a competition for a few friends of mine that wanted to learn the basics of penetration testing. In said competition, there is one section in which there's a log file you need to check out ...

From http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf Nist document what i understood is while implementing SHA512 and SHA512/224 the two differences are the Initial hash value and the final ...

So I went through my /etc/shadow file in Linux and dicoverd that my passwords were store in $6 mode so Sha512 . But why ? I mean sha512 is not even a secure Password hashing function . Why not bcrypt ...

Imagine two PBKDF2-SHA-512 hashes of the same password are generated. Each has individual salt. If an attacker had one hash and the salt of both hashes, would he be able to compute the missing hash or ...

More specifically is it reasonable to assume that someone with the resources of a state actor can feasibly compute a rainbow table of all the sha-512 hashes of values within the $2^{128}$ key space?
...

I am really confused and need help on this problem related to TOTP as specified in RFC6238 here: https://tools.ietf.org/html/rfc6238#section-1.2.
So I am now given a task to implement the RFC6238 to ...

In Wikipedia pseudo code of SHA-512 the padding section says pad 1 bit then 0 bits. It then goes on to say append length without 1 or 0 padding. What does that mean?
https://en.wikipedia.org/wiki/SHA-...

Dropbox have recently published How Dropbox securely stores your passwords
Is this really more secure than using bcrypt with a complexity of 11 or 12 ?
The password "chain" is secure as its weakest ...